secure image bidding system process for financial transactions, including structured investment products, escrows and interest rate swaps. Some embodiments provide a secure image bidding system and process for image-based bid transmissions where each of a plurality of bids received by the system is encrypted and held in a digital “Vault” until the specified end of the bid period, at which time a package containing the encrypted bids, a log of server activity, and a digital checksum of the original bid file is sent via electronic mail to the bid broker and other participants. A second electronic mail message is sent to the bid broker and other participants containing the decryption key. During the bid process, no party has access to the bid information and there is no human interaction in the receipt, conversion to image, encryption, storage or conveyance of compiled information.

Patent
   8180701
Priority
Mar 19 2007
Filed
Oct 17 2011
Issued
May 15 2012
Expiry
Mar 19 2028

TERM.DISCL.
Assg.orig
Entity
Small
0
5
all paid
1. A computer-implemented secure-image-bidding process comprising:
providing a broker user interface on a computer system that elicits and receives information from one or more brokers to setup a plurality of bid processes including a first bid process, administers a database of bidders on the computer system, and performs one or more reporting functions;
defining, in the computer system, an expiration time for a bid period of the first bid process;
electronically receiving into the computer system a plurality of image-based bids submitted by a plurality of bidders for the first bid process only at times before the expiration time for the first bid process;
encrypting, in the computer system, the plurality of image-based bids for the first bid process upon receipt or earlier to form a plurality of encrypted bids;
generating and logging, in the computer system, digital-file-integrity information for each of the plurality of image-based bids received for the first bid process;
securely storing on the computer system the plurality of encrypted bids in a secure electronic vault, wherein the vault includes a directory in which specific information, including encrypted bids and digital-file-integrity information, about each one of the plurality of bid processes is automatically retained, and wherein the specific information for the first bid process is retained in an inaccessible state until the expiration time of the first bid process;
decrypting using the computer system and delivering to one or more transaction participants image-based bid information for the first bid process from the vault only following the expiration time of the first bid process;
receiving into the computer system a bid summary report based on the decrypted image-based bid information and a decision from the one or more brokers to award the first bid;
delivering the bid summary report to the plurality of bidders for the first bid process; and
using the computer system, automatically creating an electronic archive of information relating to the plurality of bid processes, including the encrypted bids, the bid summary report, and the digital-file-integrity information for the first bid process.
3. A non-transitory computer-readable medium having instructions stored thereon for causing a suitably programmed computer to execute a method, the method comprising:
providing a broker user interface on a computer system that elicits and receives information from one or more brokers to setup a plurality of bid processes including a first bid process, administers a database of bidders on the computer system, and performs one or more reporting functions;
defining, in the computer system, an expiration time for a bid period of the first bid process;
electronically receiving into the computer system a plurality of image-based bids submitted by a plurality of bidders for the first bid process only at times before the expiration time for the first bid process;
encrypting, in the computer system, the plurality of image-based bids for the first bid process upon receipt or earlier to form a plurality of encrypted bids;
generating and logging, in the computer system, digital-file-integrity information for each of the plurality of image-based bids received for the first bid process;
securely storing on the computer system the plurality of encrypted bids in a secure electronic vault, wherein the vault includes a directory in which specific information, including encrypted bids and digital-file-integrity information, about each one of the plurality of bid processes is automatically retained, and wherein the specific information for the first bid process is retained in an inaccessible state until the expiration time of the first bid process;
decrypting using the computer system and delivering to one or more transaction participants image-based bid information for the first bid process from the vault only following the expiration time of the first bid process;
receiving into the computer system a bid summary report based on the decrypted image-based bid information and a decision from the one or more brokers to award the first bid;
delivering the bid summary report to the plurality of bidders for the first bid process; and
using the computer system, automatically creating an electronic archive of information relating to the plurality of bid processes, including the encrypted bids, the bid summary report, and the digital-file-integrity information for the first bid process.
5. A computer-implemented secure-image-bidding system comprising: a computer system that includes:
a broker-user interface that elicits and receives information into the computer system from one or more brokers to setup a plurality of bid processes including a first bidding process, administers a database of bidders, and performs one or more reporting functions, wherein the first bidding process has a defined expiration time;
a receiver configured to electronically receive into the computer system a plurality of image-based bids submitted by a plurality of bidders for the first bidding process only at times before the expiration time of the first bidding process;
an encrypter in the computer system configured to encrypt the plurality of bids for the first bid process upon receipt or earlier to form a plurality of encrypted bids;
an automatic digital file-integrity generator and logger that generates and logs digital-file-integrity information, in the computer system, for each of the plurality of image-based bids received for the first bid process;
storage configured to securely store the plurality of encrypted bids in a secure electronic vault, wherein the vault includes a directory in which specific information, including encrypted bids and digital-file-integrity information, about each one of the plurality of bid processes is automatically retained, and wherein the specific information for the first bid process is retained in an inaccessible state until the expiration time of the first bid process;
a decrypter configured to decrypt and deliver to one or more transaction participants image-based bid information for the first bidding process from the vault only following the expiration time of the first bid process;
a receiver configured to electronically receive into the computer system a bid summary report based on the decrypted image-based bid information and a decision from the one or more brokers to award the first bid;
a transmitter configured to deliver the bid summary report to the plurality of bidders for the first bid process; and
an archive unit configured to automatically create an electronic archive of information relating to the plurality of bid processes, including the encrypted bids, the bid summary report, and the digital-file-integrity information for the first bid process.
2. The process of claim 1, wherein the encrypting of the plurality of image-based bids upon receipt or earlier further includes encrypting at least some of the plurality of image-based bids after they are generated by a bidder and before they are sent to the computer system.
4. The computer-readable medium of claim 3, further comprising instructions such that the encrypting of the plurality of image-based bids upon receipt or earlier further includes encrypting at least some of the plurality of image-based bids after they are generated by a bidder and before they are sent to the computer system.
6. The system of claim 5, wherein the encrypter encrypts at least some of the plurality of image-based bids before they are submitted by respective bidders.
7. The process of claim 1, wherein the electronically receiving includes receiving at least one electronic-facsimile bid transmission.
8. The process of claim 1, wherein the electronically receiving includes receiving at least one electronic-mail bid transmission.
9. The process of claim 1, further comprising automatically controlling electronic receipt of a first facsimile bid transmission and converting the received first facsimile bid transmission to a compressed-image-format file.
10. The process of claim 1, further comprising automatically confirming receipt of at least one of the plurality of image-based bids.
11. The process of claim 1, wherein the digital-file-integrity information includes a digital checksum.
12. The process of claim 1, wherein at least one of the plurality of image-based bids has a Tagged Image file (TIF) format.
13. The computer-readable medium of claim 3, further comprising instructions such that the electronically receiving includes receiving at least one electronic-facsimile bid transmission.
14. The computer-readable medium of claim 3, further comprising instructions such that the electronically receiving includes receiving at least one electronic-mail bid transmission.
15. The computer-readable medium of claim 3, further comprising instructions such that the method further comprises automatically controlling electronic receipt of a first facsimile bid transmission and converting the received first facsimile bid transmission to a compressed-image-format file.
16. The computer-readable medium of claim 3, further comprising instructions such that the method further comprises automatically confirming receipt of at least one of the plurality of image-based bids.
17. The computer-readable medium of claim 3, further comprising instructions such that the digital-file-integrity information includes a digital checksum.
18. The computer-readable medium of claim 3, wherein at least one of the plurality of image-based bids has a Tagged Image file (TIF) format.
19. The system of claim 5, wherein the receiver is further configured to receive at least one electronic-facsimile bid transmission.
20. The system of claim 5, wherein the receiver is further configured to receive at least one electronic-mail bid transmission.
21. The system of claim 5, further comprising a facsimile receiver and image converter configured to automatically control electronic receipt of a first facsimile bid transmission and convert the received first facsimile bid transmission to a compressed-image-format file.
22. The system of claim 5, further comprising a confirmation unit configured to automatically confirm receipt of at least one of the plurality of image-based bids.
23. The system of claim 5, wherein the digital-file-integrity information includes a digital checksum.
24. The system of claim 5, wherein at least one of the plurality of image-based bids has a Tagged Image file (TIF) format.

This application is a divisional of U.S. patent application Ser. No. 13/108,936 filed May 16, 2011, titled “SECURE BIDDING SYSTEM AND METHOD” (which issued as U.S. Pat. No. 8,041,631 on Oct. 18, 2011), which is a divisional of U.S. patent application Ser. No. 12/051,725 filed Mar. 19, 2008, titled “SECURE IMAGE BIDDING SYSTEM” (which issued as U.S. Pat. No. 7,945,504 on May 17, 2011), which claimed benefit under 35 U.S.C. §119(e) of U.S. Provisional Patent Application No. 60/895,739 filed Mar. 19, 2007 and titled “SECURE IMAGE BIDDING SYSTEM,” each of which is incorporated herein by reference in its entirety.

The invention lies in the field of financial systems and processes that are assistive mainly to the municipal finance industry, but to other industries as well. More particularly, it relates to a process that permits a broker for structured investment products, escrow purchases and interest-rate-swap and other competitive quotations to accept image-based bids, including facsimile and electronic mail bids, which are cryptographically secured upon receipt, such that during a defined bid period, no parties have access to the actual bid information until the close of the bid period when a decryption key is generated by the system.

Under present Federal tax law, the reinvestment of bond proceeds generated through the sale of municipal bonds by the bond issuer (typically a governmental entity such as a state, city, county or school district) is subject to significant restriction. With some exceptions, an issuer's investment earnings on idle bond proceeds are limited to the arbitrage yield on the bonds (as defined by the Internal Revenue Code). Additional interest earned above the arbitrage yield generally must be rebated to the U.S. Government. By law the placement of investments of bond proceeds must be done in a competitive fashion, ensuring the highest yield possible given the bidding restrictions. Generally, at least three bona fide bids must be offered before one may be accepted under Internal Revenue Service “safe harbor” guidelines.

The typical current practice is for a third-party bid broker to develop and distribute bid specifications and a bid form to potential bidders. At or before an appointed time, bidders may submit bids to the broker by voice, facsimile, or electronic mail. During the bidding process, the broker is aware of the values of the bids submitted.

The practice of brokering these types of investments is not at present regulated. As a result, in recent times the IRS has found or has alleged that participants in the bidding process—both brokers and the bidders (providers of the investment products, typically investment banks and insurance companies)—have rigged and colluded on bids, resulting in lower investment earnings on the investments and, as a result, lower rebate payments to the U.S. Government. The IRS estimates the costs of this bid-rigging and collusion to exceed $100 million to date.

Generally, this illicit rigging and collusion involves brokers and/or providers agreeing to: (1) provide non-competitive bids in order to meet the three-bid minimum; (2) make or participate in side payments of fees or other considerations in order to ensure a particular bid is the winner; (3) provide a “last-look” to a bidder, giving one participant information on the results of the bidding process and leading to an unfair advantage.

Most of these non-competitive processes result from the broker's ability to influence the outcome of the bidding process during the bid itself. By creating a secure process for the receipt of bids, restricting the broker's knowledge of specific bid information during the bid process, creating an electronic log of all bidding activity, and providing all bids received simultaneously and transparently to transaction participants (broker, issuer, bond counsel, tax counsel) at the expiration of the bid process, the broker's ability to influence the outcome is nearly eliminated. A level playing field is created for all bidders and the highest possible investment yield is assured to the benefit of the issuer and the U.S. Government.

This process uses the same technologies currently employed by the bidders—specifically, facsimile, and to some extent, electronic mail—in the existing process, so it does not create an additional burden to bidder participation.

In some embodiments, the invention provides a secure-image bidding system process for structured investment products, escrow purchases, and interest rate swaps. The problem of bid-rigging or broker interference is eliminated through the use of the technologies and processes described below.

In some embodiments, the invention relies upon open-source and commercial software, coupled with custom-developed interfaces, scripting and computer code to provide a computer-based application for the receipt in electronic form of secure, electronic images via facsimile, electronic mail and other mechanisms for structured investment products, escrow purchases and interest rate swaps, among others.

In some embodiments, the process includes the following steps (please note that although very specific details are listed here for completeness, the process and apparatus of the present invention can be practiced in a more general manner by changing or omitting some of these details):

While some illustrative embodiments of the invention have been described above, it is, of course, understood that various modifications will be apparent to those of ordinary skill in the art. Such modifications are within the spirit and scope of the invention, which is limited and defined only by the appended claims.

FIG. 1 is a block-diagram overview of a process 100, identifying the key features of the invention.

FIG. 2 is a block-diagram overview of a bid-setup process 200, identifying the steps a broker will take to ready the system to receive bids at a future time.

FIG. 3 is a block-diagram of a process 300 having the automatic steps performed by the server in the moments prior to the opening of a bid process.

FIG. 4 is a block-diagram of a process 400 that illustrates the mechanics of the system's use of Public Key Infrastructure to encrypt and decrypt bids and related items.

FIG. 5 is a block-diagram of a process 500 that identifies the steps that the system undergoes during the test phase prior to the commencement of a bid process. The test phase provides the broker with positive feedback that the system is working properly ahead of the actual bid.

FIG. 6 is a block-diagram of a process 600 that elaborates on the bid receipt process, showing how images of the bids are received or created, encrypted, and sent to the Vault

FIG. 7 is a block-diagram of a process 700 that identifies how bidders will be advised that their bids were received by the system.

FIG. 8 is a block-diagram of a process 800 that defines the steps automatically taken by the system at the end of the bidding (EOB) process, including the generation of a key for decryption of the items stored in the Vault.

FIG. 9 is a block-diagram of a process 900 that describes the process whereby the broker may summarize the results of the bidding and distribute those results to the bidders and other interested transaction participants.

FIG. 10 is a block-diagram of a process 1000 that shows the administrative processes that can be taken to add or remove brokers, change passwords, and manage archived information.

FIG. 11 is a block-diagram of a process 1100 that further elaborates on the archive management process, including the ability to write archives to CD-ROM.

FIG. 12 is a block-diagram of a process 1200 that describes the server logging management system, which is integral to the transparency of the system.

Although the following detailed description contains many specifics for the purpose of illustration, a person of ordinary skill in the art will appreciate that many variations and alterations to the following details are within the scope of the invention. Accordingly, the following preferred embodiments of the invention are set forth without any loss of generality to, and without imposing limitations upon the claimed invention.

In the following detailed description of the preferred embodiments, reference is made to the accompanying drawings that form a part hereof, and in which are shown by way of illustration specific embodiments in which the invention may be practiced. It is understood that other embodiments may be utilized and structural changes may be made without departing from the scope of the present invention.

The leading digit(s) of reference numbers appearing in the Figures generally corresponds to the Figure number in which that component is first introduced, such that the same reference number is used throughout to refer to an identical component which appears in multiple Figures. Signals and connections may be referred to by the same reference number or label, and the actual meaning will be clear from its use in the context of the description.

FIG. 1 is a block-diagram overview of a process 100, identifying the key features of the invention. Process 100 includes a summary of some embodiments of the invention, whereby bids, established by a broker (Processes 101, 102) are received as and/or converted to electronic image files (Processes 103, 104, 105), encrypted and then held securely until the expiration of the bid period (Processes 106,107). Some embodiments provide a secure image bidding system and/or process for image-based bid transmissions where each of a plurality of bids received by the system is encrypted and held in a digital “vault” until the specified end of the bid period, at which time a package containing the encrypted bids, a log of server activity, and a digital checksum of the original bid file is sent via electronic mail to the bid broker and other participants (Processes 108, 110, 111, 112). A second electronic mail message is sent to the bid broker and other participants containing the decryption key (Process 109). The vault is then archived permanently on the server and on removable media (Process 113). During the bid process, no party has access to the bid information and there is no human interaction in the receipt, conversion to image, encryption, storage or conveyance of compiled information.

FIG. 2 is a block-diagram overview of a bid-setup process 200, identifying the steps a broker will take to ready the system to receive bids at a future time. Process 200 includes a graphical user interface (Process 201) allowing a broker to establish a bidding period (Process 202), to identify a distribution list of individuals who will receive the bid images and decryption keys upon completion of the process, to identify a number or pool of numbers to which bidders may send their bids via facsimile, to generate an electronic mail address unique to the bidding process to which bidders may send their bids via electronic mail (all in Process 203), to maintain a database of bidder facsimile numbers and associated electronic mail addresses to allow the system to generate confirmation of receipt of the facsimile bid, and to update or modify bid parameters, including the time and date of the bid (all in Processes 205, 206). At the conclusion of this step, the system automatically generates a pair of cryptographic keys (Process 204), unique to the bid process, to be used subsequently to encrypt and eventually decrypt bid-related files.

FIG. 3 is a block-diagram of a process 300 having the automatic steps performed by the server in the moments prior to the opening of a bid process. Process 300 includes the generation of a second pair of cryptographic keys to be stored on a key server (Process 306) used in the encryption and eventual decryption of image files (Process 301). The process documents the opening of a test phase (Process 302), which is more fully described in FIG. 5, and illustrates the automatic removal of broker (Process 303) and administrator access (Process 304) to the system as the bid period nears. The process concludes with the commencement of services on the server integral to the reception of bid transmittals, include facsimile and electronic mail services (Process 305).

FIG. 4 is a block-diagram of a process 400 that illustrates the mechanics of the system's use of Public Key Infrastructure to encrypt and decrypt bids and related items. Process 400 includes the generation of two pairs of keys: one pair created at the conclusion of the bid set-up process illustrated in FIG. 3 (Process 402); the second pair created shortly before the bid period opens (Process 403). The figure illustrates how each pair of keys is used to both encrypt and decrypt files (Processes 401 and 404). Part of the security of the system is that both pairs of keys are required for the encryption/decryption process to function properly. Without both sets of keys, secure images cannot be decrypted (Process 405).

FIG. 5 is a block-diagram of a process 500 that identifies the steps that the system undergoes during the test phase prior to the commencement of a bid process. The test phase provides the broker with positive feedback that the system is working properly ahead of the actual bid. Process 500 includes the same steps as the bid set-up phase shown in FIG. 3. The test process (Processes 501, 502, 503, 504) delivers both a test facsimile and a test electronic mail through the system and reports to the broker that all services are functioning appropriately (Processes 506 and 507). The process concludes with the system automatically readying itself to receive bid transmissions (Process 505).

FIG. 6 is a block-diagram of a process 600 that elaborates on the bid receipt process, showing how images of the bids are received or created, encrypted, and sent to the Vault. Process 600 begins with the receipt of a bid, via facsimile, electronic mail or other electronic means, each spawning a separate computing process to avoid queuing (Process 601). For a facsimile transmission, the bid is received (Process 602), a checksum is calculated to ensure file integrity (Process 604), the facsimile is converted to a Tagged Image File (TIF) format (or other compressed-image-format file, such as .pdf, .jpeg, .gif, or other suitable format) (Process 603), and the TIF is encrypted (Process 605). The original, unencrypted TIF image is instantaneously destroyed (Process 611). The encrypted TIF is then delivered to the vault (Process 606).

For electronic mail messages (Process 607), attachments, including the bid image, are stripped (Process 608) and converted to TIF images (or other compressed-image-format files) (Process 609). The TIF images are encrypted (Process 605), a checksum is calculated (Process 604), and the encrypted image is delivered to the vault (Process 606). The original email is also encrypted and sent to the Vault (Process 610).

FIG. 7 is a block-diagram of a process 700 that identifies how bidders will be advised that their bids were received by the system. Process 700 includes the automatic routing of confirmations of bids via the in-bound electronic mail address (Process 707, 708, 709, 710) or using a database lookup for facsimile transmissions (Processes 701, 702, 703), whereby the inbound call identifier is associated with an electronic mail address (Process 704). The system automatically generates confirmations to assure the bidders that their bids were received (Processes 704, 705). The confirmation emails are destroyed instantaneously upon their transmission to the bidders (Process 706).

FIG. 8 is a block-diagram of a process 800 that defines the steps automatically taken by the system at the end of the bidding (EOB) process, including the generation of a key for decryption of the items stored in the Vault. Process 800 includes the automatic shutdown of computer services necessary to receive inbound transmissions of bids. At the conclusion of the bidding period, inbound emails will be refused (Processes 807, 808) and inbound facsimile transmissions not in progress at the time of bid expiration will also be refused (Processes 801, 802). Facsimile transmissions in progress at the time of bid expiration will be allowed to conclude. Once the all transmissions have stopped and been processed as described in FIG. 6, the system will automatically bundle all documents in the Vault into a compressed, encrypted file (Process 803) and transmit the compressed file to the broker and the broker's pre-defined distribution list (not including the bidders) (Processes 809, 810, 804). Shortly after the Vault is transmitted to the list, the system sends the same list a decryption key to be used to open the image files containing the bids (Processes 805, 806). The decryption key and the compressed file are also stored in a permanent archive on the server.

FIG. 9 is a block-diagram of a process 900 that describes the process whereby the broker may summarize the results of the bidding and distribute those results to the bidders and other interested transaction participants. Process 900 includes a graphical user interface (Process 901) where the broker can enter the bid results in tabular form (Processes 902, 903) and then have the system automatically send a formatted report of those results to a list of the broker's choice (Process 905). In this way, the bidders know the outcome of the bid. The results are stored permanently on the server (Process 904).

FIG. 10 is a block-diagram of a process 1000 that shows the administrative processes that can be taken to add or remove brokers, change passwords, and manage archived information. Process 1000 includes a graphical user interface (Process 1002) allowing a bidding administrator to add brokers authorized (Process 1001) to use the bidding system, to managing archives of prior bids, to change login and password information, and to cancel a bid process due to technical difficulties (Process 1003).

FIG. 11 is a block-diagram of a process 1100 that further elaborates on the archive management process, including the ability to write archives to CD-ROM. Process 1100 includes a graphical user interface (Process 1102) designed to allow the authorized bidding administrator (Process 1101) to resend an archive to a transaction participant, to backup an archive for offsite storage, or to burn an archive to CD-ROM or related media (Process 1103)

FIG. 12 is a block-diagram of a process 1200 that describes the server logging management system, which is integral to the transparency of the system. Process 1200 includes the tracking of Server Administrator activities (Process 1201) in daily logs that are rotated to a permanent archive (Process 1205). It includes the tracking of Bidding Administrator activities, outside of the bidding process (i.e., maintenance, Process 1202) in daily logs that are both rotated to a permanent archive and copied to the Server Administrator (Process 1206). It includes the tracking of Bid-Related Bidding Administration activities (Process 1203) in daily logs that are both archived permanently and reported immediately to the Server Administrator (Process 1207.) And, it includes the tracking of Broker activities in daily logs (Process 1204) that are rotated to a permanent archive, as well as reported immediately to both the Server Administrator and the Bidding Administrator (Process 1208).

In some embodiments, the present invention provides a computer-implemented secure image bidding system process, especially for structured investment products, escrow purchases and interest rate swap transactions, whereby image-based bids are accepted via computer-based facsimile, electronic mail or other means. The bid images are immediately encrypted upon receipt and stored in a secure “Vault,” preventing bid interference by the broker administering the bid process. In some embodiments, the system includes:

In some embodiments, the present invention provides a computer-implemented secure-image-bidding process including providing a broker user interface that elicits and receives information from one or more brokers to setup bid processes, administer a database of bidders, and perform one or more reporting functions; electronically receiving a plurality of image-based bids submitted by a plurality of bidders; encrypting the bids upon receipt or earlier; securely storing the encrypted bids in a secure electronic vault database, thus preventing bid interference by persons administering the bidding process; and decrypting and delivering to transaction participants the contents of the vault database following expiration of the bidding process.

Some embodiments further include encrypting at least some of the bids before they are submitted by respective bidders. Some embodiments further include providing a bid-administrator user interface that elicits and receives information from one or more bid-and-server administrators to add authorized users to the system, cancel bidding processes and perform other system maintenance activities.

Some embodiments further include automatically restricting a start time and a stop time of a bid period. Some embodiments further include automatically associating one or more specific telephone numbers and fax-modem pools with a particular bid process. Some embodiments further include automatically generating one or more pairs of encryption keys for each particular bid process using public key infrastructure (PKI) cryptography. Some embodiments further include automatically controlling electronic receipt of facsimile bid transmissions and converting the received facsimile bid transmissions to a Tagged Image File (TIF) format file or other suitable compressed-image-format file.

Some embodiments further include automatically controlling electronic receipt of electronic mail bid transmissions. Some embodiments further include automatically controlling delivery of a confirmation receipt to a sender, wherein, for electronic mail bid submittals, this includes delivering a confirmation receipt to a received electronic mail address of a sender, and wherein, for facsimile bid submittals, this includes delivering a confirmation receipt to the sender based upon a database lookup for an electronic mail address using at least one of (a) a caller-identification number and (b) facsimile header information transmitted with the facsimile.

Some embodiments further include for each of a plurality of received electronic-mail transmissions: automatically stripping any attachments from the transmission, automatically converting the stripped attachments to Tagged Image File (TIF) format file or other suitable compressed-image-format file, and automatically and securely storing the original electronic mail transmission in a manner so that it may not be viewed until expiration of the bid period.

Some embodiments further include automatically generating and logging a digital checksum for each TIF file or other suitable compressed-image-format file received to ensure file integrity throughout the bid period. Some embodiments further include automatically controlling encryption of each original image file received using PKI and immediately deleting the unencrypted original image files.

Some embodiments further include automatically delivering one or more encrypted TIF files or other suitable compressed-image-format files to a digital “vault,” wherein the vault includes a secure directory in which specific information about a bid process including encrypted bids, server logs, auction reports, digital checksums is automatically retained without access by any person or entity until an expiration of the bid period.

Some embodiments further include automatically disabling receipt of facsimile and electronic mail transmissions at expiration of the bid period. Some embodiments further include automatically compiling contents of the vault in a compressed folder following expiration of bid period. Some embodiments further include automatically sending the compressed folder to a predefined distribution list via electronic mail following expiration of the bid period. Some embodiments further include automatically generating a decryption key following expiration of the bid period. Some embodiments further include automatically sending the decryption key via electronic mail following expiration of the bid period.

Some embodiments further include automatically securing a graphical user interface that allows the broker to enter bid summary and results information.

Some embodiments further include automatically, upon command by the broker, sending bid summary information via electronic mail to at least one of (i) bidders and (ii) a predefined distribution list of email addresses and (iii) a predefined list of facsimile numbers. Some embodiments further include automatically creating an electronic archive of all bid process information, including encrypted bids, server logs, broker reporting, encryption keys and checksum information. Some embodiments further include automatically, upon command by the broker or administrator, writing an archive or archives to CD-ROM or other media for permanent storage.

In some embodiments, the present invention provides a computer-implemented secure-image-bidding system including a) a graphical user interface operable to allow brokers to setup bid processes, administer a database of bidders and perform reporting functions; b) a user interface operable to allow bid-and-server administrators to add authorized users to the system, cancel bidding processes and perform other system maintenance activities; c) a computer-based process operable to restrict the date, time and length of a bid period; d) a computer-based process operable to automatically associate specific telephone numbers and fax-modem pools with a particular bid process; e) a computer-based process operable to automatically generate pairs of encryption keys for each particular bid process using public key infrastructure (PKI) cryptography; f) a computer-based process operable to automatically control electronic receipt of facsimile bid transmissions and their conversion to a Tagged Image File (TIF) format file or other suitable compressed-image-format file; g) a computer-based process operable to automatically control electronic receipt of electronic mail bid transmissions; h) a computer-based process operable to automatically control delivery of a confirmation receipt to a sender; wherein, for electronic mail bid submittals, this provides delivery of a confirmation receipt to a received electronic mail address of a sender, wherein, for facsimile bid submittals, this provides delivery of a confirmation receipt to the sender based upon a database lookup, maintained by the broker, for an electronic mail address using a caller identification number or facsimile header information transmitted with the facsimile; i) a computer-based process operable to automatically strip attachments from electronic-mail transmissions, convert those attachments to a Tagged Image File (TIF) format file or other suitable compressed-image-format file, and securely store the original electronic mail transmission so that it may not be viewed until expiration of the bid period; j) a computer-based process operable to automatically generate and log a digital checksum for each TIF file or other suitable compressed-image-format file received to ensure file integrity throughout the bid period; k) a computer-based process operable to automatically control encrypt each image file received using PKI and immediately to delete the unencrypted original files; 1) a computer-based process operable to automatically deliver one or more encrypted TIF files or other suitable compressed-image-format files to a digital “Vault,” a secure directory in which specific information about a bid process—encrypted bids, server logs, auction reports, digital checksums—is retained without access by any party until the expiration of the bid period; m) a computer-based process operable to automatically disable receipt of facsimile and electronic mail transmissions at expiration of the bid period; n) a computer-based process operable to automatically compile contents of the Vault in a compressed folder following expiration of bid period; o) a computer-based process operable to automatically send the compressed folder to a predefined distribution list via electronic mail following expiration of the bid period; p) a computer-based process operable to automatically generate a decryption key following expiration of the bid period; q) a computer-based process operable to automatically send the decryption key via electronic mail following expiration of the bid period; r) a secure graphical user interface that allows the broker to enter bid summary and results information; s) a computer-based process operable to automatically, upon command by the broker, to send bid summary information via electronic mail to (i) bidders and/or (ii) a predefined distribution list; t) a computer-based process operable to automatically create an electronic archive of all bid process information, including encrypted bids, server logs, broker reporting, encryption keys and checksum information; and u) a computer-based process operable to automatically, upon command by the broker or administrator, write an archive or archives to CD-ROM or other media for permanent storage.

In some embodiments, the present invention provides a computer-implemented secure-image-bidding process including providing a broker user interface that elicits and receives information from one or more brokers to setup a plurality of bid processes, administers a database of bidders, and performs one or more reporting functions; electronically receiving a plurality of image-based bids submitted by a plurality of bidders; encrypting the plurality of image-based bids upon receipt or earlier to form a plurality of encrypted bids; securely storing the plurality of encrypted bids in a secure electronic vault database; and decrypting and delivering to transaction participants information from the vault database following expiration of the bidding process.

In some embodiments, the encrypting of the plurality of bids upon receipt or earlier further includes encrypting at least some of the plurality of bids before they are submitted by respective bidders.

Some embodiments further include providing a bid-administrator user interface that elicits and receives information from one or more bid-and-server administrators to add authorized users to the system and cancel bidding processes; automatically restricting a start time and a stop time of a bid period; automatically generating one or more pairs of encryption keys for each one of the plurality of bid processes using public key infrastructure (PKI) cryptography; automatically controlling electronic receipt of facsimile bid transmissions and converting the received facsimile bid transmissions to a compressed-image-format file; and automatically controlling electronic receipt of electronic mail bid transmissions.

Some embodiments further include automatically controlling delivery of a confirmation receipt to a sender, wherein, for electronic mail bid submittals, the automatically controlling of the delivery includes delivering a confirmation receipt to a received electronic mail address of a sender, and wherein, for facsimile bid submittals, the automatically controlling of the delivering includes delivering a confirmation receipt to the sender based upon a database lookup for an electronic mail address using at least one of a group consisting of (a) a caller-identification number and (b) facsimile header information transmitted with the facsimile.

Some embodiments further include, for each of a plurality of received electronic-mail transmissions, automatically stripping any attachments from the transmission; automatically converting the stripped attachments to a compressed-image-format file; automatically and securely storing the original electronic mail transmission such that the original electronic mail transmission cannot be viewed until expiration of the bid period; automatically generating and logging a digital checksum for each compressed-image format file received to ensure file integrity throughout the bid period; automatically controlling encryption of each original image file received using PKI and immediately deleting unencrypted original image files; and automatically receiving encrypted compressed-image-format files into a digital vault, wherein the vault includes a secure directory in which specific information about one of the plurality of bid processes including encrypted bids, server logs, auction reports, and digital checksums is automatically retained in an inaccessible state until an expiration of the bid period.

Some embodiments further include automatically compiling contents of the vault in a compressed folder following expiration of bid period; automatically sending the compressed folder to a predefined distribution list via electronic mail following expiration of the bid period; automatically generating a decryption key following expiration of the bid period; and automatically sending the decryption key via electronic mail following expiration of the bid period.

Some embodiments further include automatically disabling receipt of facsimile and electronic mail transmissions upon expiration of the bid period.

Some embodiments further include automatically securing a graphical user interface that allows the broker to enter bid summary and results information; and automatically, upon command by the broker, sending bid summary information via electronic mail to at least one of a group consisting of (i) bidders and (ii) a predefined distribution list of email addresses and (iii) a predefined list of facsimile numbers.

Some embodiments further include automatically creating an electronic archive of information relating to the plurality of bid processes, including encrypted bids, server logs, broker reporting, encryption keys, and checksum information; and automatically, upon command by at least one of (i) the broker and (ii) the administrator, writing one or more archives to computer-readable archive media for long-term storage.

In some embodiments, the present invention provides a computer-readable medium having instructions stored thereon for causing a suitably programmed computer to execute a method, the method including providing a broker user interface that elicits and receives information from one or more brokers to setup a plurality of bid processes, administers a database of bidders, and performs one or more reporting functions; electronically receiving a plurality of image-based bids submitted by a plurality of bidders; encrypting the plurality of image-based bids upon receipt or earlier to form a plurality of encrypted bids; securely storing the plurality of encrypted bids in a secure electronic vault database; and decrypting and delivering to transaction participants information from the vault database following expiration of the bidding process.

Some embodiments further include instructions such that the encrypting of the plurality of bids upon receipt or earlier further includes encrypting at least some of the plurality of bids before they are submitted by respective bidders.

Some embodiments further include instructions such that the method further includes providing a bid-administrator user interface that elicits and receives information from one or more bid-and-server administrators to add authorized users to the system and cancel bidding processes; automatically restricting a start time and a stop time of a bid period; automatically generating one or more pairs of encryption keys for each one of the plurality of bid processes using public key infrastructure (PKI) cryptography; automatically controlling electronic receipt of facsimile bid transmissions and converting the received facsimile bid transmissions to a compressed-image-format file; and automatically controlling electronic receipt of electronic mail bid transmissions.

Some embodiments further include instructions such that the method further includes automatically controlling delivery of a confirmation receipt to a sender, wherein, for electronic mail bid submittals, the automatically controlling of the delivery includes delivering a confirmation receipt to a received electronic mail address of a sender, and wherein, for facsimile bid submittals, the automatically controlling of the delivering includes delivering a confirmation receipt to the sender based upon a database lookup for an electronic mail address using at least one of a group consisting of (a) a caller-identification number and (b) facsimile header information transmitted with the facsimile.

Some embodiments further include instructions such that the method further includes, for each of a plurality of received electronic-mail transmissions, automatically stripping any attachments from the transmission; automatically converting the stripped attachments to a compressed-image-format file; automatically and securely storing the original electronic mail transmission such that the original electronic mail transmission cannot be viewed until expiration of the bid period; automatically generating and logging a digital checksum for each compressed-image format file received to ensure file integrity throughout the bid period; automatically controlling encryption of each original image file received using PKI and immediately deleting unencrypted original image files; and automatically receiving encrypted compressed-image-format files into a digital vault, wherein the vault includes a secure directory in which specific information about one of the plurality of bid processes including encrypted bids, server logs, auction reports, and digital checksums is automatically retained in an inaccessible state until an expiration of the bid period.

Some embodiments further include instructions such that the method further includes automatically compiling contents of the vault in a compressed folder following expiration of bid period; automatically sending the compressed folder to a predefined distribution list via electronic mail following expiration of the bid period; automatically generating a decryption key following expiration of the bid period; and automatically sending the decryption key via electronic mail following expiration of the bid period.

Some embodiments further include instructions such that the method further comprises automatically disabling receipt of facsimile and electronic mail transmissions upon expiration of the bid period.

Some embodiments further include instructions such that the method further includes automatically securing a graphical user interface that allows the broker to enter bid summary and results information; and automatically, upon command by the broker, sending bid summary information via electronic mail to at least one of a group consisting of (i) bidders and (ii) a predefined distribution list of email addresses and (iii) a predefined list of facsimile numbers.

Some embodiments further include instructions such that the method further includes automatically creating an electronic archive of information relating to the plurality of bid processes, including encrypted bids, server logs, broker reporting, encryption keys, and checksum information; and automatically, upon command by at least one of (i) the broker and (ii) the administrator, writing one or more archives to computer-readable archive media for long-term storage.

In some embodiments, the present invention provides a computer-implemented secure-image-bidding system including a broker-user interface that elicits and receives information from one or more brokers to setup a plurality of bid processes, administers a database of bidders, and performs one or more reporting functions; a receiver configured to electronically receive a plurality of image-based bids submitted by a plurality of bidders; an encrypter configured to encrypt the plurality of bids upon receipt or earlier to form a plurality of encrypted bids; storage configured to securely store the plurality of encrypted bids in a secure electronic vault database; and a decrypter configured to decrypt and deliver to transaction participants information from the vault database following expiration of the bidding process.

In some embodiments, the encrypter encrypts at least some of the plurality of bids before they are submitted by respective bidders.

Some embodiments further include a bid-administrator user interface that elicits and receives information from one or more bid-and-server administrators to add authorized users to the system and cancel bidding processes; a timer configured to automatically restrict a start time and a stop time of a bid period; an encryption-key generator configured to automatically generate one or more pairs of encryption keys for each one of the plurality of bid processes using public key infrastructure (PKI) cryptography; a facsimile receiver and image converter configured to automatically control electronic receipt of facsimile bid transmissions and convert the received facsimile bid transmissions to a compressed-image-format file; and an electronic-mail receiver configured to automatically control electronic receipt of electronic mail bid transmissions.

Some embodiments further include a confirmation unit configured to automatically control delivery of a confirmation receipt to a sender, wherein, for electronic mail bid submittals, the confirmation unit automatically delivers a confirmation receipt to a received electronic mail address of a sender, and wherein, for facsimile bid submittals, the confirmation unit automatically delivers a confirmation receipt to the sender based upon a database lookup for an electronic mail address using at least one of a group consisting of (a) a caller-identification number and (b) facsimile header information transmitted with the facsimile.

Some embodiments further include, for each of a plurality of received electronic-mail transmissions, a stripper unit configured to automatically strip any attachments from the transmission; an image-conversion unit configured to automatically convert the stripped attachments to a compressed-image-format file; a storage unit configured to automatically and securely store the original electronic mail transmission such that the original electronic mail transmission cannot be viewed until expiration of the bid period; a log unit configured to automatically generate and log a digital checksum for each compressed-image format file received to ensure file integrity throughout the bid period; an encryption unit configured to automatically control encryption of each original image file received using PKI and immediately delete unencrypted original image files; and a digital vault configured to automatically receive encrypted compressed-image-format files, wherein the vault includes a secure directory in which specific information about one of the plurality of bid processes including encrypted bids, server logs, auction reports, and digital checksums is automatically retained in an inaccessible state until an expiration of the bid period.

Some embodiments further include a compiler configured to automatically compile contents of the vault in a compressed folder following expiration of bid period; a transmitting unit configured to automatically send the compressed folder to a predefined distribution list via electronic mail following expiration of the bid period; and a decryption unit configured to automatically generate a decryption key following expiration of the bid period, wherein the transmitting unit is also configured to automatically send the decryption key via electronic mail following expiration of the bid period.

Some embodiments further include a disable timer configured to automatically disable receipt of facsimile and electronic mail transmissions upon expiration of the bid period.

Some embodiments further include a secure graphical user interface that allows the broker to enter bid summary and results information; and a transmitter configured to automatically, upon command by the broker, send bid summary information via electronic mail to at least one of a group consisting of (i) bidders and (ii) a predefined distribution list of email addresses and (iii) a predefined list of facsimile numbers.

Some embodiments further include an archive unit configured to automatically create an electronic archive of information relating to the plurality of bid processes, including encrypted bids, server logs, broker reporting, encryption keys, and checksum information; and an archive-storage unit configured to automatically, upon command by at least one of a group consisting of (i) the broker and (ii) the administrator, write one or more archives to computer-readable archive media for long-term storage.

In some embodiments, the present invention provides a system including a) a graphical user interface operable to allow brokers to setup a plurality of bid processes, administer a database of bidders and perform reporting functions; b) a user interface operable to allow bid-and-server administrators to add authorized users to the system and to cancel bidding processes; c) a computer-based unit operable to restrict the date, time and length of a bid period; d) a computer-based unit operable to automatically associate specific telephone numbers and fax-modem pools with one of the plurality of bid processes; e) a computer-based unit operable to automatically generate pairs of encryption keys for each one of the plurality of bid processes using public key infrastructure (PKI) cryptography; f) a computer-based unit operable to automatically control electronic receipt of facsimile bid transmissions and their conversion to a compressed-image-format file; g) a computer-based unit operable to automatically control electronic receipt of electronic mail bid transmissions; h) a computer-based unit operable to automatically control delivery of a confirmation receipt to a sender; wherein, for electronic mail bid submittals, this provides delivery of a confirmation receipt to a received electronic mail address of a sender, and wherein, for facsimile bid submittals, this provides delivery of a confirmation receipt to the sender based upon a database lookup, maintained by the broker, for an electronic mail address using a caller identification number or facsimile header information transmitted with the facsimile; i) a computer-based unit operable to automatically strip attachments from electronic-mail transmissions, convert those attachments to a compressed-image-format file, and securely store the original electronic mail transmission so that it may not be viewed until expiration of the bid period; j) a computer-based unit operable to automatically generate and log a digital checksum for each compressed-image-format file received to ensure file integrity throughout the bid period; k) a computer-based unit operable to automatically control encrypt each image file received using PKI and immediately to delete the unencrypted original files; l) a computer-based unit operable to automatically deliver encrypted compressed-image format files to a digital Vault, a secure directory in which specific information about one of the plurality of bid processes, including encrypted bids, server logs, auction reports, and digital checksums, is retained without access by any party until the expiration of the bid period; m) a computer-based unit operable to automatically disable receipt of facsimile and electronic mail transmissions at expiration of the bid period; n) a computer-based unit operable to automatically compile contents of the Vault in a compressed folder following expiration of bid period; o) a computer-based unit operable to automatically send the compressed folder to a predefined distribution list via electronic mail following expiration of the bid period; p) a computer-based unit operable to automatically generate a decryption key following expiration of the bid period; q) a computer-based unit operable to automatically send the decryption key via electronic mail following expiration of the bid period; r) a secure graphical user interface that allows the broker to enter bid summary and results information; s) a computer-based unit operable to automatically, upon command by the broker, to send bid summary information via electronic mail to (i) bidders and/or (ii) a predefined distribution list; t) a computer-based unit operable to automatically create an electronic archive of information relating to one of the plurality of bid processes, the archived information including encrypted bids, server logs, broker reporting, encryption keys and checksum information; and u) a computer-based unit operable to automatically, upon command by the broker or administrator, write an archive to archive media for long-term storage.

It is to be understood that the above description is intended to be illustrative, and not restrictive. Although numerous characteristics and advantages of various embodiments as described herein have been set forth in the foregoing description, together with details of the structure and function of various embodiments, many other embodiments and changes to details will be apparent to those of skill in the art upon reviewing the above description. The scope of the invention should, therefore, be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled. In the appended claims, the terms “including” and “in which” are used as the plain-English equivalents of the respective terms “comprising” and “wherein,” respectively. Moreover, the terms “first,” “second,” and “third,” etc., are used merely as labels, and are not intended to impose numerical requirements on their objects.

Lloyd, Dennis W., White, Jeff T., Pacunski, Charles M.

Patent Priority Assignee Title
Patent Priority Assignee Title
6122738, Jan 22 1998 Symantec Corporation Computer file integrity verification
6161099, May 29 1997 MuniAuction, Inc.; MUNIAUCTION, INC Process and apparatus for conducting auctions over electronic networks
6606607, Jun 17 1999 MCJ Ventures, Inc. Individualized, real-time, interactive e-commerce auction
6834312, May 02 2000 CADOPENER COM LLC Method and apparatus for delivery of data over a network
7523063, May 29 1997 MuniAuction, Inc. Process and apparatus for conducting auctions over electronic networks
/
Executed onAssignorAssigneeConveyanceFrameReelDoc
Oct 17 2011Columbia Capital Management, L.L.C.(assignment on the face of the patent)
Date Maintenance Fee Events
Nov 11 2015M2551: Payment of Maintenance Fee, 4th Yr, Small Entity.
Nov 08 2019M2552: Payment of Maintenance Fee, 8th Yr, Small Entity.
Nov 14 2023M2553: Payment of Maintenance Fee, 12th Yr, Small Entity.


Date Maintenance Schedule
May 15 20154 years fee payment window open
Nov 15 20156 months grace period start (w surcharge)
May 15 2016patent expiry (for year 4)
May 15 20182 years to revive unintentionally abandoned end. (for year 4)
May 15 20198 years fee payment window open
Nov 15 20196 months grace period start (w surcharge)
May 15 2020patent expiry (for year 8)
May 15 20222 years to revive unintentionally abandoned end. (for year 8)
May 15 202312 years fee payment window open
Nov 15 20236 months grace period start (w surcharge)
May 15 2024patent expiry (for year 12)
May 15 20262 years to revive unintentionally abandoned end. (for year 12)